Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Ilias Chantzos | 19 Aug 2014 | 0 comments

Cyber security as a political issue? Undoubtedly. What makes it so is that governments and politicians at large recognise national interest is heavily impacted by the influence of cyber – now generally used to refer to all automated or computerised systems, in terms of both hardware and software – because cyber is the horizontal element that underpins economic life.

With globalisation enabled by transport technology, communications technology and global markets, and cyber used so widely within the economy and our personal lives, its reach extends deep into the political landscape. Cyber runs our economy, it can be used to reach large amounts of the population, for committing crime, be weaponised and it affects national security – and therefore the state – at its core. All of which means that it has a direct impact on public interest and therefore attracts political attention.

UK...

Arnaud_Taddei | 18 Aug 2014 | 1 comment

In data centres across the world the principles of server virtualisation, and their impact on how server resources can be allocated, managed and secured, have been established over the past decade and are now part of mainstream IT. 

While similar ideas have taken some time to infiltrate into the logical and physical architectures of our communications networks, they are now reaching the mainstream - in the shape of Network Function Virtualisation (NFV) and Software Defined Networking (SDN). 

The former (NFV) enables an opening up of networking functionality, while the latter (SDN) speaks to the ability to orchestrate and control networking functions as a result. Together, they separate the control plane from the networking layer, enabling networks to be created more flexibly than was possible in the hardware-defined days of ‘big iron’. 

In addition, they present the opportunity to create closer, more...

Caroline Dennington | 28 Jul 2014 | 0 comments

Symantec is in transition and so, too, are the problems that customers are asking us to solve. We believe that the time to simplify and integrate one of the industry’s broadest portfolios is now, refocusing on what’s needed most, in order to fulfil those customers’ widely diverse and ever-expanding expectations.

That is a role we are more than happy to take on at Symantec, especially as more and more organisations are telling us that what they want, most of all, is a trusted IT advisor that can help them seize new opportunities, reduce risk and cost, and ensure that services and data are available, resilient and compliant. In other words, they want a simpler way to grow their business – and a partner to keep their systems and people safe on that journey.

Go_CMYK_0_0.jpgSymantec has been making important changes over the last 18 months  that will help us better serve our customer’s...

Caroline Dennington | 23 Jul 2014 | 0 comments

The recent visit of several industry analysts in Symantec's UK office created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information Fabric Platform that underpins this strategy.

Paul Dominjon, Symantec's Senior Product Marketing Manager, pointed out that customers are moving increasingly to a virtual environment, while many business-critical applications remain on physical servers. At the same time, our customers often have operations that have grown through mergers and acquisitions with up to two to three backup solutions in play and little or no integration. “The upshot of this is that customers are simply too busy to rationalize, consolidate and simplify their technology and licenses,” said Dominjon.

Whatever the customer infrastructure, Symantec's role is to support our customers and the wider business community through our redefined Unified Information Management Strategy, delivering a platform...

Drew Meyer | 17 Jul 2014 | 0 comments

Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex and disparate IT environment for organizations everywhere.

That was the good news we were able to deliver at a recent webinar for the APJ region where industry analysts gathered to hear how environments spanning both physical and virtual can be better managed using our IM solutions. What we were able to tell everyone was exactly how we are now able to reduce those complexity issues they face every day, supporting our customers as they perform crucial functions around archiving, data protection and backup, and data recovery.

In a world where the move into the cloud is accelerating – public, private and hybrid –customers want to leverage all the advantages this may offer by having the flexibility of running any operating...

Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
 
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
 
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
 
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
 
Equally there are times when it makes more sense to run...

fbunn | 17 Jun 2014 | 0 comments

While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide similar levels of service to traditional utility companies such as water or energy providers. 

In security terms this means offering a certain level of information protection - as has been said more than once, just as we expect water to come out of our pipes clean, so we expect the same for our information. 

This doesn’t mean that the onus is entirely on the CSP, of course. Across the history of end-point security, providers and software vendors have had to work together to help protect the confidentiality, integrity and availability of data whether it is at rest on a PC, or in transit across the network. 

More recently, the rise of mobile computing has seen handsets start simple and become increasingly complex, meaning that consumers are not always well prepared against...

fbunn | 21 May 2014 | 0 comments

An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. These attacks have already increased by 91% year on year; in addition, whereas 50% were aimed at SMBs in 2012, by 2013 the number had increased to 61%.

The clear suggestion - confirmed by other research we have done - is that the creators of such attacks are becoming smarter in terms of understanding how to profit from targeted attacks. As a result they are focusing less on bigger enterprises and more on smaller and mid-size companies, which often have less security countermeasures in place. 

This begs the question - where are such organisations going to get help, and...

Paul Wood | 08 Apr 2014 | 0 comments

In security as in business, information is power. As we put together the latest edition of the Internet Security Threat Report, we wanted to do more than simply throw some figures out there. As a result, Volume 19 presents a comprehensive analysis of last year’s threats according to publicly available information and events within Symantec’s purview, as well as detailed guidance about what security professionals can do in response. 

At the top level of the report, the main finding was a rapid and significant increase in breaches leading to the exposure of individual identities - employee, customer and patient details. Overall a total of 552 million identities were exposed, across 253 significant security breaches. 

Just as significantly, many of these breaches took place in the final quarter of the year, suggesting that we are at the beginning of a slew of such attacks - one of the reasons we felt pressed to include detailed advice in...

tgrandpre | 17 Mar 2014 | 0 comments

Mobile World Congress was an exciting time for Symantec this year, with so much constructive engagement taking place with many of you from the analyst community, particularly around the key areas of Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Security and Enterprise File Synchronization and Sharing (EFSS).

From my conversations with you, what really seemed to catch your attention were the advances we’ve been making in mobile as a whole. The overall integration between MDM and MAM – and broader solutions that enhance our mobile offerings – many of you agreed were taking things in a new direction.

Most of you seemed more than familiar with Norton Zone already, but it might be worth a quick recap here. Norton Zone is our secure sync and file technology – a personal cloud service that lets users safely share files from your computer, smartphone and tablet. Many of our...